Tag: key log

Spyrix Personal Monitor is a powerful multi-functional program for complete and detailed remote monitoring of user activity. It can monitor keyboard activity, activity on social networks like Facebook and MySpace among others, web surfing, IM Messengers like ICQ, MSN and Skype, running and active applications, printing activity and external storages like USB, CD, DVD, HDD and memory cards.

The program allows conducting control remotely no matter where you are located by sending logs to your email, FTP or LAN and viewing logs from your account online. It cannot be detected by computer users and antivirus programs. After all, it cannot be called a key logger if it can be easily detected, right?

The program is perfect for parental control and controlling employees. Among its features are the following:

Remote monitoring from any place and any device (PC, tablet, smartphone)

Undetectable to antivirus software

Remote Uninstallation

Clipboard control

Facebook includes capture passwords

MySpace, Twitter, Google+, LinkedIn

IM Chat (Skype, ICQ etc)

Search Engines Monitoring

URL monitoring

Blocking sites: by categories (for example

adult, dating), blacklist of URLs,

blacklist of keywords.

Apps activity

E-mail, FTP, LAN log delivery

Alert keywords

Analytics module

“Black List” Sites (Alert URLs)

Removable Drives (USB, HDD, SD) Control

Printer Control

Domain users monitoring (available for Business licenses)

Spyrix Personal Monitor allows detailed recording of all user activities. Spyrix Personal Monitor will help you solve the problem of monitoring your children without being caught. You will always know what you child was doing while using the PC.

Spyrix Personal Monitor is a powerful protection tool from leakage of corporate secrets (DLP – data loss prevention). Nowadays on the market of data loss prevention (DLP) software there are lots of solutions that often cost thousands of dollars and in consequence of which are not available for small and medium companies.

Overall, the price tag for this keylogger is fairly reasonable. Considering its multitude of features and its effectiveness to monitor everything that goes in and out of your network, I’d say this is a sweet deal. This effective product for solving problems of secret information leakage and employees activity control allows small companies protecting themselves from unfair workers and problems with leakage of secret information.